

Apologies. Was under the impression you installed the cachy os kernel. Keep in mins you can join the discord and ask there!
Apologies. Was under the impression you installed the cachy os kernel. Keep in mins you can join the discord and ask there!
Be thorough, what messages did you get?
Also their tool i stalls the repos only (you install the kernel right after)
Follow up that you can also just install the cachy-os kernel which has it baked in.
I reversed engineered a keyboard for a presentation in uni. I’ll drop you an excerpt of a written review:
Resources used I learned the USB protocol from this (the relevant parts I needed). We’re thinking of including some basic understanding of the USB protocol in the slides. https://www.beyondlogic.org/usbnutshell/usb6.shtml I got an idea of what could be going on from the following link, specifically the section I’ve set. https://github.com/openrazer/openrazer/wiki/Reverse-Engineering-USB-Protocol#phase-4—decoding-the-protocol I deciphered the protocol using the USBHID packets that would be sent. I was highly sure it was USBHID from a pointer from another Linux community member, but this article was my third source to confirming this. https://hackaday.com/2020/04/14/reverse-engineering-an-rgb-keyboard-under-linux/ One of the sources for information to develop these procedures was from the openRGB wiki. This stream has to do with reversing using URB. I find this might be out of scope, and it would’ve been way tougher to reverse engineer with this.
Feel free to ask as needed here. Spam the requests on the software while monitoring wireshark to be sure of what is what.
The other large comment by “taaz” is also very useful and parts of which I did use while reverse engineering.
That 20% performance hit on linux is only for dx12 games. The rest are fine.